PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Cisco Certified Support Technician

CCST Cybersecurity 100-160 Official Cert Guide

Shane Sexton Raymond Lacoste

$108.95   $97.84

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Cisco Press
20 February 2024
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Cybersecurity 100-160 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology experts Shane Sexton and Raymond Lacoste share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports An online Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time

Content Update Program:

This Cert Guide includes coverage of all the topics on the Cisco Certified Support Technician CCST Cybersecurity exam from the original exam blueprint. Visit ciscopress.com/newcerts for information on any digital updates for this book that align with Cisco exam blueprint version changes

The Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide walks you through all the exam topics found in the Cisco CCST exam. Topics covered include

Essential Security Principles Basic Network Security Concepts Endpoint Security Concepts Vulnerability Assessment and Risk Management Incident Handling

Companion Website

The companion website contains more than 200 unique practice exam questions.

Pearson Test Prep online system requirements:

Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above.

Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. Internet access required.

Pearson Test Prep offline system requirements:

Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

Also available from Cisco Press for CCST study is the Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Premium Edition and Practice Test. This digital-only certification preparation product combines an eBook with an enhanced Pearson Test Prep Practice Test.

This integrated learning package

Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

By:   ,
Imprint:   Cisco Press
Country of Publication:   United States
ISBN:   9780138203924
ISBN 10:   013820392X
Series:   Official Cert Guide
Pages:   384
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
Introduction xxv Part I Introduction to Cybersecurity Chapter 1 Security Principles 2 “Do I Know This Already?” Quiz 2 Foundation Topics 4 The CIA Triad 4 Common Security Terms 5 Types of Attackers and Their Reasons for Attacks 7 Code of Ethics 9 Summary 10 Exam Preparation Tasks 11 Review All Key Topics 12 Define Key Terms 12 Complete Tables and Lists from Memory 12 Review Questions 12 Chapter 2 Common Threats, Attacks, and Vulnerabilities 14 “Do I Know This Already?” Quiz 15 Foundation Topics 16 Malware Variants 16 IoT Vulnerabilities 19 Distributed Denial of Service 19 On-Path Attacks 21 Insider Threats 23 Social Engineering Tactics 25 Phishing 26 Spear Phishing 26 Whaling 26 Vishing 26 Smishing 27 Piggybacking/Tailgating 27 Malvertising 27 Physical Attacks 27 Advanced Persistent Threats (APTs) 28 Summary 29 Exam Preparation Tasks 31 Review All Key Topics 31 Define Key Terms 31 Complete Tables and Lists from Memory 32 Review Questions 32 Chapter 3 Access Management 34 “Do I Know This Already?” Quiz 34 Foundation Topics 36 Introduction to AAA 36 Authentication 36 Multifactor Authentication (MFA) 37 Passwords and Password Policies 39 Authorization 41 Accounting 41 RADIUS 42 Summary 44 Exam Preparation Tasks 45 Review All Key Topics 45 Define Key Terms 45 Complete Tables and Lists from Memory 46 Review Questions 46 Chapter 4 Cryptography 48 “Do I Know This Already?” Quiz 49 Foundation Topics 51 Cryptography Overview 51 Encryption and Decryption 51 States of Data 52 Symmetric Cryptography 52 Asymmetric Cryptography 53 Confidentiality with Asymmetric Cryptography 53 Authentication with Asymmetric Cryptography 54 Combining Confidentiality and Authentication with Asymmetric Cryptography 54 Using Symmetric and Asymmetric Cryptography 55 Types of Ciphers 56 Symmetric Ciphers 56 Types of Asymmetric Algorithms 57 Certificates and PKI 58 SCEP 62 Digital Certificates 62 Lifetime of a Digital Certificate 63 PKI Infrastructure 65 Hashing 66 Shared Secret Keys and Salting with Hashing 68 Cryptography in the Real World 69 Web Browsing 69 VPNs 70 Remote Management 70 Cisco Next-Generation Cryptography 70 Summary 71 Exam Preparation Tasks 72 Review All Key Topics 72 Complete Tables and Lists from Memory 73 Define Key Terms 73 Review Questions 73 Part II Network Security Chapter 5 Introduction to Networking, Addressing, and TCP/IP Protocols 76 “Do I Know This Already?” Quiz 76 Foundation Topics 78 The TCP/IP Stack 78 Common TCP/IP Protocols and Their Vulnerabilities 81 Transmission Control Protocol (TCP) 81 User Datagram Protocol (UDP) 81 Internet Protocol Version 4 (IPv4) 82 Internet Protocol Version 6 (IPv6) 83 Media Access Control (MAC) 83 Address Resolution Protocol (ARP) 84 Hypertext Transfer Protocol (HTTP) 84 Internet Control Message Protocol (ICMP) 85 Dynamic Host Configuration Protocol (DHCP) 85 Domain Name System (DNS) 86 File Transfer Protocol (FTP) 86 Telnet 87 Secure Shell (SSH) 87 Network Addressing and Its Impact on Security 88 IPv4 and IPv6 88 CIDR Notation 89 Network Segmentation 89 Public Versus Private Networks 90 NAT 92 MAC Addressing 94 Summary 94 Exam Preparation Tasks 97 Review All Key Topics 97 Complete Tables and Lists from Memory 98 Define Key Terms 98 Review Questions 98 Chapter 6 Network Infrastructure 100 “Do I Know This Already?” Quiz 101 Foundation Topics 102 The Network Security Architecture 102 Screened Subnets, Virtualization, and the Cloud 103 Screened Subnet (DMZ) 103 Virtualization 105 Cloud 106 Proxy Servers 107 Forward Proxy 108 Reverse Proxy 109 Cisco WSA 111 Honeypots 112 Intrusion Detection/Prevention Systems 113 Intrusion Detection Systems (IDSs) 113 Intrusion Prevention Systems (IPSs) 113 Network-Based and Host-Based IDSs/IPSs 113 Signature-Based and Behavioral-Based Detection 113 Summary 114 Exam Preparation Tasks 115 Review All Key Topics 115 Complete Tables and Lists from Memory 116 Define Key Terms 116 Review Questions 116 Chapter 7 Controlling Network Access 118 “Do I Know This Already?” Quiz 118 Foundation Topics 120 Virtual Private Networks 120 Site-to-Site 121 Remote-Access 122 IPsec 124 Firewalls 125 NGFW 127 Cisco Firepower Next-Generation Firewall (NGFW) 128 Access Control Lists 129 Key Aspects and Uses of Access Control Lists 129 ACL Entries 130 Standard and Extended ACLs 132 Standard ACL 132 Extended ACL 133 ACL Evaluation 133 Network Access Control 134 Summary 137 Exam Preparation Tasks 138 Review All Key Topics 138 Complete Tables and Lists from Memory 139 Define Key Terms 139 Review Questions 139 Chapter 8 Wireless SOHO Security 142 “Do I Know This Already?” Quiz 143 Foundation Topics 144 Hardening Wireless Routers and Access Points 144 Administrative Interface 144 Updates 145 Wireless Encryption Standards 146 WEP 146 WPA 146 WPA2 146 WPA3 147 Wireless Authentication 148 Personal Mode 148 Enterprise Mode 149 WPA3 Enhanced Open 150 Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering 150 Wi-Fi Protected Setup 151 SSID 151 MAC Address Filtering 152 Common Wireless Network Threats and Attacks 152 Rogue Access Points and Evil Twins 152 War Driving 154 Wireless Password Cracking 154 Protecting Yourself from Wireless Attacks 155 Summary 155 Exam Preparation Tasks 157 Review All Key Topics 157 Complete Tables and Lists from Memory 158 Define Key Terms 158 Review Questions 158 Part III Endpoint Security Chapter 9 Operating Systems and Tools 160 “Do I Know This Already?” Quiz 160 Foundation Topics 163 Host Security Features 163 Windows 164 Microsoft Defender 165 Virus & Threat Protection 165 Firewall & Network Protection 166 App & Browser Control 167 CMD and PowerShell 169 NTFS Permissions 170 BitLocker 172 Windows Updates 173 Event Viewer and Audit Logs 173 Linux 175 firewalld and UFW 175 Bash 176 Linux Permissions 178 SELinux and AppArmor 179 SELinux 179 AppArmor 180 dm-crypt and LUKS 180 Updates: yum, dnf, and apt 180 Linux Logs 181 macOS 183 Firewall 183 Zsh 184 APFS Permissions 184 FileVault 185 Updates 185 macOS Logs: Console 186 Tools 186 netstat and ss 186 nslookup and dig 187 nslookup 187 dig 188 tcpdump and Wireshark 188 tcpdump 188 Wireshark 189 syslog 190 Summary 191 Exam Preparation Tasks 192 Review All Key Topics 192 Complete Tables and Lists from Memory 192 Define Key Terms 193 Review Questions 193 Chapter 10 Endpoint Policies and Standards 196 “Do I Know This Already?” Quiz 196 Foundation Topics 198 Asset Management 198 Program Deployment 199 Backups 199 Local and Remote Backups 200 Full, Differential, and Incremental Backups 200 Bring Your Own Device (BYOD) 201 Pros and Cons of BYOD 202 Device and Configuration Management 202 Data Encryption 204 App Distribution 205 Regulatory Compliance 205 PCI-DSS 205 HIPAA 206 GDPR 206 Summary 207 Exam Preparation Tasks 207 Review All Key Topics 207 Complete Tables and Lists from Memory 208 Define Key Terms 208 Review Questions 208 Chapter 11 Network and Endpoint Malware Detection and Remediation 210 “Do I Know This Already?” Quiz 210 Foundation Topics 211 Monitoring and Detection 211 Signature Types 212 Scanning Systems 214 Cisco AMP 215 Reviewing Logs 216 Malware Remediation Best Practices 218 Summary 218 Exam Preparation Tasks 220 Review All Key Topics 220 Complete Tables and Lists from Memory 220 Define Key Terms 220 Review Questions 221 Chapter 12 Risk and Vulnerability Management 222 “Do I Know This Already?” Quiz 222 Foundation Topics 223 The Vocabulary of Risk 223 Vulnerabilities 224 The Vulnerability Management Lifecycle 225 Active and Passive Scanning 228 Port Scanning 229 Risk 229 Risk Prioritization 230 Risk Ranks and Levels 230 Data Types and Classification 231 Security Assessments 233 Risk Management 234 Risk Management Strategies 234 Summary 237 Exam Preparation Tasks 238 Review All Key Topics 238 Complete Tables and Lists from Memory 238 Define Key Terms 238 Review Questions 238 Chapter 13 Threat Intelligence 240 “Do I Know This Already?” Quiz 240 Foundation Topics 242 Threat Intelligence 242 Vulnerabilities Databases and Feeds 242 Pros and Cons of Vulnerability Databases 243 CVE and CVSS 244 Vulnerability Scanning and Assessment Tools 245 Additional Sources of Threat Intelligence 245 Reports and News 245 Reports 246 News 247 Collective, Ad Hoc, and Automated Intelligence 247 STIX and TAXII 248 STIX 248 TAXII 250 How and Why to Proactively Share Threat Intelligence 250 Summary 251 Exam Preparation Tasks 252 Review All Key Topics 252 Complete Tables and Lists from Memory 252 Define Key Terms 252 Review Questions 253 Chapter 14 Disaster Recovery and Business Continuity 254 “Do I Know This Already?” Quiz 254 Foundation Topics 256 Disaster Recovery Plans 256 Disasters 256 Disaster Recovery Controls 258 Backups 259 Business Impact Analyses (BIAs) 261 Recovery Time Objectives 262 Recovery Point Objectives 262 Business Continuity Plans 262 Disaster Recovery Versus Business Continuity 263 Summary 264 Exam Preparation Tasks 265 Review All Key Topics 265 Complete Tables and Lists from Memory 266 Define Key Terms 266 Review Questions 266 Chapter 15 Incident Handling 268 “Do I Know This Already?” Quiz 268 Foundation Topics 270 Events and Incidents 270 Incident Response 270 Preparation 270 Team 271 Tools 271 Training and SOPs 272 Reporting and Notification Requirements 272 Detection and Analysis 273 Containment, Eradication, and Recovery 274 Post-Incident Activities 274 Digital Forensics and Incident Response 275 Attack Frameworks and Concepts 275 Lockheed Martin Cyber Kill Chain 275 MITRE ATT&CK 276 Diamond Model of Intrusion Analysis 276 Tactics, Techniques, and Procedures 277 Evidence and Artifacts 278 Sources and Volatility 278 Preservation and Chain of Custody 279 Compliance Frameworks 280 GDPR 280 HIPAA 280 PCI-DSS 280 FERPA 280 FISMA 281 Comparing Regulatory Frameworks 281 Summary 281 Exam Preparation Tasks 282 Review All Key Topics 282 Complete Tables and Lists from Memory 283 Define Key Terms 283 Review Questions 283 Part IV CCST Cybersecurity Preparation Chapter 16 Final Preparation 286 Tools and Resources 286 Study Tips 287 Summary 287 Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates 288 The Purpose of This Chapter 288 About Possible Exam Updates 289 Impact on You and Your Study Plan 289 News About the Next Exam Release 290 Updated Technical Content 290 Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions 292 Glossary 307 Online Elements Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner Glossary 9780138203924 TOC 1/19/2024

Shane Sexton has spent years learning and teaching all things IT. He holds CCNP Security, CND, CySA+, CCNA CyberOps, and numerous other certifications and has prepared thousands of students to take these exams. Shane earned bachelor’s degrees in technology management and liberal studies (and wishes he’d taken fewer philosophy classes). He currently works as a network and system administrator at an MSP, where every day brings new learning opportunities. When he’s not tackling IT emergencies, Shane practices piano, reads anything nonfiction, and expertly avoids family members with printer issues. He currently resides in Phoenix, Arizona, with three cats who have no respect for his property or the rule of law. Raymond Lacoste has dedicated his career to developing the skills of those interested in IT. In 2001, he began to mentor hundreds of IT professionals pursuing their Cisco certification dreams. This role led to teaching Cisco courses full time. Raymond is currently a master instructor for Cisco Enterprise Routing and Switching, AWS, ITIL, and Cybersecurity at Stormwind Studios. Raymond treats all technologies as an escape room, working to uncover every mystery in the protocols he works with. Along this journey, Raymond has passed more than 120 exams, and his office wall includes certificates from Microsoft, Cisco, ISC2, ITIL, AWS, and CompTIA. If you were visualizing Raymond’s office, you’d probably expect the usual network equipment, certifications, and awards. Those certainly take up space, but they aren’t his pride and joy. Most impressive, at least to Raymond, is his gemstone and mineral collection; once he starts talking about it, he just can’t stop. Who doesn’t get excited by a wondrous barite specimen in a pyrite matrix? Raymond presently resides with his wife and two children in eastern Canada, where they experience many adventures together.

See Also